Configuring monitoring alarm policies, Monitoring alarm policy list contents, Monitoring alarm policy details – H3C Technologies H3C Intelligent Management Center User Manual

Page 208: Basic information area, Usb monitoring area

Advertising
background image

192

3.

Click the Delete icon

for the energy-saving policy you want to delete.

A confirmation dialog box appears.

4.

Click OK.

Configuring monitoring alarm policies

Monitoring alarm policies enable the DAM server to encapsulate monitoring information in syslogs and

send them to the specified syslog server. The monitoring information is reported by the iNode client, and

includes software and hardware changes of assets, unauthorized copying, and printing of sensitive files.
Operators can view, add, modify, and delete monitoring alarm policies.
Before you configure monitoring alarm policies, select Enable for Send Syslogs on the Service

Parameters page. Otherwise, the DAM server cannot send syslogs to the specified syslog server. For

more information about the configuration procedure, see "

DAM service parameters

."

The IMC platform can serve as the syslog server to receive syslogs from the DAM server. For more

information about syslog management, see H3C IMC Base Platform Administrator Guide.

Monitoring alarm policy list contents

Policy Name—Name of the monitoring alarm policy. Click the name to view detailed information.

Description—Description of the monitoring alarm policy.

Service Group—Service group to which the monitoring alarm policy belongs.

Modify—Click the Modify icon

to modify the policy settings.

Delete—Click the Delete icon

to delete the monitoring alarm policy.

Monitoring alarm policy details

The Monitoring alarm policy details page has the following areas:

Basic Information

USB Monitoring

Printer Monitoring

Hardware Changes Monitoring

Software Changes Monitoring

Basic Information area

Policy Name—Name of the monitoring alarm policy.

Service Group—Service group to which the monitoring alarm policy belongs.

Description—Description of the monitoring alarm policy.

USB Monitoring area

Keywords to Trigger Alarms—List of keywords for triggering alarms. When the DAM server receives

information about files written from the asset to a USB storage device, it checks the file names for
keywords. When a keyword is found, the DAM server encapsulates the information in syslogs and sends

them to the specified syslog server. Operators can view the following information on the syslog server:

Advertising